Security Issues, Vulnerabilities and Countermeasures in Information Communication Technology and Signal Processing

Akshay Goel, Jayesh Gaur, Ajay Rose
{"title":"Security Issues, Vulnerabilities and Countermeasures in Information Communication Technology and Signal Processing","authors":"Akshay Goel, Jayesh Gaur, Ajay Rose","doi":"10.1109/ICSPC46172.2019.8976734","DOIUrl":null,"url":null,"abstract":"This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPC46172.2019.8976734","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.
信息通信技术与信号处理中的安全问题、漏洞与对策
论述了大量使用的是自由和开放源码软件因为它有许多优点与之关联的肚子就像一个成本节约和快速的方法,但我们知道一切都与之相关的一些缺点,这也是讨论的情况上面的大量使用开源软件,它给许多漏洞,研究人员仍在努力找到一个处理这些漏洞的方法。漏洞不仅存在于此类开源软件中,也存在于信息通信技术(ICT)的外包中。文中还讨论了信号处理的算法。文中还讨论了信号处理的各种应用。论文的最后一部分阐述了传感器网络安全面临的挑战和目标。最后,对信息通信技术和信号处理中的安全漏洞进行了讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信